CA2983458A1 - Systeme de securite electronique et procede utilisant des agents intelligents - Google Patents
Systeme de securite electronique et procede utilisant des agents intelligentsInfo
- Publication number
- CA2983458A1 CA2983458A1 CA2983458A CA2983458A CA2983458A1 CA 2983458 A1 CA2983458 A1 CA 2983458A1 CA 2983458 A CA2983458 A CA 2983458A CA 2983458 A CA2983458 A CA 2983458A CA 2983458 A1 CA2983458 A1 CA 2983458A1
- Authority
- CA
- Canada
- Prior art keywords
- target
- network
- scan
- results
- network scan
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 163
- 230000004044 response Effects 0.000 claims description 37
- 238000012545 processing Methods 0.000 claims description 31
- 230000001737 promoting effect Effects 0.000 claims description 18
- 238000011835 investigation Methods 0.000 claims description 9
- 230000008859 change Effects 0.000 claims description 8
- 238000004458 analytical method Methods 0.000 claims description 5
- 241000700605 Viruses Species 0.000 claims description 4
- 230000009471 action Effects 0.000 claims description 4
- 230000001965 increasing effect Effects 0.000 claims description 4
- 230000006855 networking Effects 0.000 claims description 4
- 238000004891 communication Methods 0.000 claims description 3
- 238000013507 mapping Methods 0.000 claims description 3
- 230000007812 deficiency Effects 0.000 claims description 2
- 238000012546 transfer Methods 0.000 description 62
- 239000003795 chemical substances by application Substances 0.000 description 37
- 230000008569 process Effects 0.000 description 23
- 238000013528 artificial neural network Methods 0.000 description 18
- 238000012544 monitoring process Methods 0.000 description 6
- 230000000977 initiatory effect Effects 0.000 description 5
- 238000007726 management method Methods 0.000 description 5
- 230000006399 behavior Effects 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000002452 interceptive effect Effects 0.000 description 3
- 230000007774 longterm Effects 0.000 description 3
- 238000012552 review Methods 0.000 description 3
- 241000282412 Homo Species 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/02—Knowledge representation; Symbolic representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Selon l'invention, un procédé de sécurité électronique utilisant des agents intelligents (IA) comprend les étapes suivantes : surveiller sur un réseau, par l'agent intelligent (IA), un programme logiciel s'exécutant sur un système ; recevoir, par l'IA, des résultats produits par le logiciel ; présenter, par l'IA, les résultats ; classer par catégories les résultats, par l'IA, pour un stockage efficace et une récupération ultérieure efficace ; sauvegarder, par l'IA, les résultats classés par catégories ; utiliser les résultats classés par catégories, par l'IA, pour déduire des nouvelles connaissances ; classer par catégories les nouvelles connaissances, par l'IA, pour un stockage efficace et une récupération ultérieure efficace ; sauvegarder, par l'IA, les nouvelles connaissances classées par catégories ; et utiliser un ou plusieurs des résultats classés par catégories et les nouvelles connaissances classées par catégories, par l'IA, pour configurer le logiciel.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562193486P | 2015-07-16 | 2015-07-16 | |
US62/193,486 | 2015-07-16 | ||
PCT/US2016/042820 WO2017011833A1 (fr) | 2015-07-16 | 2016-07-18 | Système de sécurité électronique et procédé utilisant des agents intelligents |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2983458A1 true CA2983458A1 (fr) | 2017-01-19 |
Family
ID=57757695
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2983458A Pending CA2983458A1 (fr) | 2015-07-16 | 2016-07-18 | Systeme de securite electronique et procede utilisant des agents intelligents |
Country Status (5)
Country | Link |
---|---|
US (3) | US20180146002A1 (fr) |
EP (1) | EP3281114A4 (fr) |
CA (1) | CA2983458A1 (fr) |
HK (1) | HK1244072A1 (fr) |
WO (1) | WO2017011833A1 (fr) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3366755B1 (fr) | 2017-02-22 | 2023-11-29 | Infineum International Limited | Améliorations apportées et relatives à des compositions de lubrification |
US10757137B1 (en) * | 2018-09-26 | 2020-08-25 | NortonLifeLock Inc. | Thwarting an impersonation attack using online decoy text |
CN110865774B (zh) * | 2018-12-28 | 2023-08-08 | 安天科技集团股份有限公司 | 一种打印设备的信息安全检测方法及装置 |
JP7105370B2 (ja) | 2019-03-28 | 2022-07-22 | オリンパス株式会社 | トラッキング装置、学習済モデル、内視鏡システム及びトラッキング方法 |
WO2020194663A1 (fr) * | 2019-03-28 | 2020-10-01 | オリンパス株式会社 | Dispositif de suivi, modèle pré-retenu, système d'endoscope et procédé de suivi |
US11263295B2 (en) * | 2019-07-08 | 2022-03-01 | Cloud Linux Software Inc. | Systems and methods for intrusion detection and prevention using software patching and honeypots |
US11477231B2 (en) * | 2020-06-10 | 2022-10-18 | Saudi Arabian Oil Company | System and method for vulnerability remediation prioritization |
US11783068B2 (en) * | 2021-03-24 | 2023-10-10 | Bank Of America Corporation | System for dynamic exposure monitoring |
US11824886B2 (en) | 2021-04-29 | 2023-11-21 | Google Llc | Determining the exposure level of vulnerabilities |
Family Cites Families (50)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6363411B1 (en) * | 1998-08-05 | 2002-03-26 | Mci Worldcom, Inc. | Intelligent network |
AU8567798A (en) * | 1998-06-19 | 2000-01-05 | Netsafe, Inc. | Method and apparatus for providing connections over a network |
US6321338B1 (en) * | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
US6202062B1 (en) * | 1999-02-26 | 2001-03-13 | Ac Properties B.V. | System, method and article of manufacture for creating a filtered information summary based on multiple profiles of each single user |
US20030074301A1 (en) * | 1999-11-01 | 2003-04-17 | Neal Solomon | System, method, and apparatus for an intelligent search agent to access data in a distributed network |
US6981028B1 (en) * | 2000-04-28 | 2005-12-27 | Obongo, Inc. | Method and system of implementing recorded data for automating internet interactions |
US20020093527A1 (en) * | 2000-06-16 | 2002-07-18 | Sherlock Kieran G. | User interface for a security policy system and method |
US20030051026A1 (en) * | 2001-01-19 | 2003-03-13 | Carter Ernst B. | Network surveillance and security system |
US6918066B2 (en) * | 2001-09-26 | 2005-07-12 | International Business Machines Corporation | Method and system for evaluating applications on different user agents |
CA2410118C (fr) * | 2001-10-26 | 2007-12-18 | Research In Motion Limited | Systeme et methode de surveillance des reglages de configuration pour dispositifs et services de communication mobile |
US7257630B2 (en) * | 2002-01-15 | 2007-08-14 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US20030135507A1 (en) * | 2002-01-17 | 2003-07-17 | International Business Machines Corporation | System and method for managing and securing meta data using central repository |
US7133368B2 (en) * | 2002-02-01 | 2006-11-07 | Microsoft Corporation | Peer-to-peer method of quality of service (QoS) probing and analysis and infrastructure employing same |
ATE270800T1 (de) * | 2002-05-24 | 2004-07-15 | Swisscom Mobile Ag | Vorrichtungen und verfahren zur zertifizierung von digitalen unterschriften |
US7969900B2 (en) * | 2002-06-24 | 2011-06-28 | Paradyne Corporation | Determination of network performance characteristics |
US9009084B2 (en) * | 2002-10-21 | 2015-04-14 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis and network intrusion protection in an industrial environment |
US20040088403A1 (en) * | 2002-11-01 | 2004-05-06 | Vikas Aggarwal | System configuration for use with a fault and performance monitoring system using distributed data gathering and storage |
US9503470B2 (en) * | 2002-12-24 | 2016-11-22 | Fred Herz Patents, LLC | Distributed agent based model for security monitoring and response |
US20040193918A1 (en) * | 2003-03-28 | 2004-09-30 | Kenneth Green | Apparatus and method for network vulnerability detection and compliance assessment |
US7246156B2 (en) * | 2003-06-09 | 2007-07-17 | Industrial Defender, Inc. | Method and computer program product for monitoring an industrial network |
US20070050777A1 (en) * | 2003-06-09 | 2007-03-01 | Hutchinson Thomas W | Duration of alerts and scanning of large data stores |
US7099853B1 (en) * | 2004-02-09 | 2006-08-29 | Trend Micro Incorporated | Configurable hierarchical content filtering system |
US20070180490A1 (en) * | 2004-05-20 | 2007-08-02 | Renzi Silvio J | System and method for policy management |
CN101495992A (zh) * | 2006-01-24 | 2009-07-29 | 游戏解决方案国际有限公司 | 用于数据挖掘和所挖掘数据的交互式呈现的系统和方法 |
US8429746B2 (en) * | 2006-05-22 | 2013-04-23 | Neuraliq, Inc. | Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems |
US7930256B2 (en) * | 2006-05-23 | 2011-04-19 | Charles River Analytics, Inc. | Security system for and method of detecting and responding to cyber attacks on large network systems |
SG141289A1 (en) * | 2006-09-29 | 2008-04-28 | Wireless Intellect Labs Pte Lt | An event update management system |
US7821955B2 (en) * | 2006-12-28 | 2010-10-26 | Motorola, Inc. | Universal Plug-and-Play latency and delay compensation |
US8302196B2 (en) * | 2007-03-20 | 2012-10-30 | Microsoft Corporation | Combining assessment models and client targeting to identify network security vulnerabilities |
US20090006399A1 (en) * | 2007-06-29 | 2009-01-01 | International Business Machines Corporation | Compression method for relational tables based on combined column and row coding |
US8281396B2 (en) * | 2008-08-15 | 2012-10-02 | Qualys, Inc. | System and method for performing remote security assessment of firewalled computer |
KR20120004162A (ko) * | 2010-07-06 | 2012-01-12 | 삼성전자주식회사 | 데이터베이스 관리 방법 및 이를 이용한 데이터베이스 서버 시스템 |
US9246932B2 (en) * | 2010-07-19 | 2016-01-26 | Sitelock, Llc | Selective website vulnerability and infection testing |
RU2446459C1 (ru) * | 2010-07-23 | 2012-03-27 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ проверки веб-ресурсов на наличие вредоносных компонент |
WO2012109633A2 (fr) * | 2011-02-11 | 2012-08-16 | Achilles Guard, Inc. D/B/A Critical Watch | Plateforme de gestion de contre-mesures de sécurité |
US20130263226A1 (en) * | 2012-01-22 | 2013-10-03 | Frank W. Sudia | False Banking, Credit Card, and Ecommerce System |
US9578060B1 (en) * | 2012-06-11 | 2017-02-21 | Dell Software Inc. | System and method for data loss prevention across heterogeneous communications platforms |
KR101909141B1 (ko) * | 2012-07-27 | 2018-10-17 | 엘지전자 주식회사 | 전자기기 및 전자기기의 제어방법 |
US20140108215A1 (en) * | 2012-10-12 | 2014-04-17 | Optionsxpress Holdings, Inc. | System and methods for trading |
US20140181975A1 (en) * | 2012-11-06 | 2014-06-26 | William Spernow | Method to scan a forensic image of a computer system with multiple malicious code detection engines simultaneously from a master control point |
US8925076B2 (en) * | 2012-12-11 | 2014-12-30 | Kaspersky Lab Zao | Application-specific re-adjustment of computer security settings |
US9208324B2 (en) * | 2013-09-17 | 2015-12-08 | iViZ Techno Solutions Private Limited | System and method to perform secure web application testing based on a hybrid pipelined approach |
CN105683988A (zh) * | 2013-09-27 | 2016-06-15 | 迈克菲公司 | 管理软件补救 |
GB2520987B (en) * | 2013-12-06 | 2016-06-01 | Cyberlytic Ltd | Using fuzzy logic to assign a risk level profile to a potential cyber threat |
WO2015134008A1 (fr) * | 2014-03-05 | 2015-09-11 | Foreground Security | Système de détection et d'atténuation automatisées de menace internet et procédés associés |
US9386078B2 (en) * | 2014-05-30 | 2016-07-05 | Ca, Inc. | Controlling application programming interface transactions based on content of earlier transactions |
US10936616B2 (en) * | 2014-06-09 | 2021-03-02 | Oracle International Corporation | Storage-side scanning on non-natively formatted data |
US10878039B2 (en) * | 2014-09-22 | 2020-12-29 | International Business Machines Corporation | Creating knowledge base of similar systems from plurality of systems |
JP6186515B2 (ja) * | 2014-09-30 | 2017-08-23 | 株式会社日立国際電気 | Ip通信システム、ipアドレス設定装置、及びipアドレス設定方法 |
US10146635B1 (en) * | 2015-06-30 | 2018-12-04 | EMC IP Holding Company LLC | Virtual machine backup |
-
2016
- 2016-07-18 CA CA2983458A patent/CA2983458A1/fr active Pending
- 2016-07-18 EP EP16825311.0A patent/EP3281114A4/fr active Pending
- 2016-07-18 US US15/566,691 patent/US20180146002A1/en not_active Abandoned
- 2016-07-18 WO PCT/US2016/042820 patent/WO2017011833A1/fr active Application Filing
-
2018
- 2018-03-12 HK HK18103373.1A patent/HK1244072A1/zh unknown
-
2021
- 2021-03-15 US US17/202,176 patent/US11962611B2/en active Active
-
2024
- 2024-04-15 US US18/635,726 patent/US20240275811A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
US11962611B2 (en) | 2024-04-16 |
EP3281114A1 (fr) | 2018-02-14 |
EP3281114A4 (fr) | 2018-03-14 |
US20240275811A1 (en) | 2024-08-15 |
US20180146002A1 (en) | 2018-05-24 |
WO2017011833A1 (fr) | 2017-01-19 |
HK1244072A1 (zh) | 2018-07-27 |
US20210281599A1 (en) | 2021-09-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11962611B2 (en) | Cyber security system and method using intelligent agents | |
US11171925B2 (en) | Evaluating and modifying countermeasures based on aggregate transaction status | |
Siadati et al. | Detecting structurally anomalous logins within enterprise networks | |
US10491630B2 (en) | System and method for providing data-driven user authentication misuse detection | |
EP3369232B1 (fr) | Détection de cybermenaces contre des applications nuagiques | |
EP3776307B1 (fr) | Système distribué pour une protection adaptative contre des analyseurs de vulnérabilités ciblés sur un service web | |
US20210021636A1 (en) | Automated Real-time Multi-dimensional Cybersecurity Threat Modeling | |
Tien et al. | KubAnomaly: Anomaly detection for the Docker orchestration platform with neural network approaches | |
US10972461B2 (en) | Device aware network communication management | |
RU2676021C1 (ru) | Система и способ определения DDoS-атак | |
Kholidy | Detecting impersonation attacks in cloud computing environments using a centric user profiling approach | |
US10542044B2 (en) | Authentication incident detection and management | |
JP2019506674A (ja) | パターンマッチングベースのデータセット抽出 | |
CN113660224B (zh) | 基于网络漏洞扫描的态势感知防御方法、装置及系统 | |
WO2022087510A1 (fr) | Détection et vérification de comportement | |
JP2012527691A (ja) | アプリケーションレベルセキュリティのためのシステムおよび方法 | |
Cotroneo et al. | Automated root cause identification of security alerts: Evaluation in a SaaS Cloud | |
US11481478B2 (en) | Anomalous user session detector | |
US20230095415A1 (en) | Helper agent and system | |
JP2024536226A (ja) | 機械学習を介して悪意のあるハンズオンキーボード活動を検出するためのシステムおよび方法 | |
Yamada et al. | RAT-based malicious activities detection on enterprise internal networks | |
KR101658450B1 (ko) | 웹 애플리케이션 서버로부터 수집된 트랜잭션 정보 및 고유세션 id 통한 사용자 식별을 이용한 보안장치. | |
Chopra et al. | SHAPE—an approach for self-healing and self-protection in complex distributed networks | |
KR102018348B1 (ko) | 사용자 행동 분석 기반의 목표계정 탈취 감지 장치 | |
KR102366846B1 (ko) | 데이터유출 탐지 보안 시스템 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |
Effective date: 20210618 |
|
EEER | Examination request |
Effective date: 20210618 |
|
EEER | Examination request |
Effective date: 20210618 |
|
EEER | Examination request |
Effective date: 20210618 |
|
EEER | Examination request |
Effective date: 20210618 |
|
EEER | Examination request |
Effective date: 20210618 |
|
EEER | Examination request |
Effective date: 20210618 |
|
EEER | Examination request |
Effective date: 20210618 |